In checkusertoken in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors).
[
{
"source": "https://github.com/yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba",
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "util.c"
},
"id": "CVE-2018-9275-73e96989",
"digest": {
"threshold": 0.9,
"line_hashes": [
"226607563752128757887514930765907415801",
"279701570390930019583909742435872770862",
"308494850977619412175153327874514612777",
"203417458892300943278019038761638732730"
]
},
"signature_type": "Line"
},
{
"source": "https://github.com/yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba",
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "check_user_token",
"file": "util.c"
},
"id": "CVE-2018-9275-fa157aba",
"digest": {
"length": 1698.0,
"function_hash": "119299559369141334615512022658670539382"
},
"signature_type": "Function"
}
]